Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment
|
|
- Asher Lambert
- 5 years ago
- Views:
Transcription
1 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment Sébastien Rubrecht, Vincent Padois, Philippe Bidaud, Michel De Broissia To cite this version: Sébastien Rubrecht, Vincent Padois, Philippe Bidaud, Michel De Broissia. Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment. Jadran Lenarcic and Michael M. Stanisic. Advances in Robot Kinematics: Motion in Man and Machine Proceedings of the 12th International Symposium on Advances in Robot Kinematics, Springer, pp , 2010, < / _39>. <hal > HAL Id: hal Submitted on 15 Apr 2011 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Institut des Systèmes Intelligents et de Robotique, Paris, France, rubrecht@isir.upmc.fr 4 Bouygues Travaux Publics, Guyancourt, France Abstract. In this paper, we present an iterative kinematics control law for redundant manipulators overcoming some usual problems associated to cluttered environments (constraints violations, oscillations, environment dilatation). The Constraints Compliant Control approach relies on a passive avoidance scheme (no motion generation for constraints avoidance) on a limited number of constraints selected from a vicinity analysis. A scaling solution based on the feasible motions with respect to the constraints enables to reach the frontiers of the workspace. Two missions described as sequences of key frames are simulated to compare the performances of the Constraint Compliant Control with state of the art control laws. The obtained computation times remain acceptable to consider a use in real time. Key words: Redundancy resolution, Inverse velocity kinematics, Control. 1 Introduction Industrial robotics manipulator missions have evolved from well defined tasks in structured environments to missions where the tasks are more complex (involving multiple objectives among which various constraints) and where the environments are not always known in advance and can be harsh and cluttered. As an example, the motivations of the presented work consider the use of a teleoperated manipulator aimed at working in a tunnel boring machine cutter head (see Figure 1 and [1]). In such environments, the use of redundant manipulators enables to specify simultaneously various goals on different parts of the manipulator, explicitly or automatically. It gives the possibility to fulfill different tasks while strictly satisfying a certain amount of constraints (collision avoidance, joint position and velocity limits). However, to our knowledge, there is no multi-objective method that guarantees a safe behaviour whithout substantially reducing the motion capabilities, especially when the manipulator is expected to get close to the constraints surfaces (which may be operational surfaces). This is the problem tackled in this paper. Consider a manipulator with n DOFs and a set of objectives (not necessarily imposed to the same part of the manipulator) involving m operational displacements 1
3 2 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Fig. 1 Tunnel Boring Machine: manipulator in the excavation room. δ x. The relation between the operational and the joints displacements (considered here as the actuators input signal, extension to torque controlled actuators is trivial) δx=jδq (1) where J is the jacobian associated to the objectives. In order to satisfy the constraints, usual avoidance strategies rely on an avoidance term δx C derived from a potential based on the inverse of the distance to the constraint [2]. This strategy is called active, as a motion is generated to avoid the constraint. Thus, the expected behaviour will result from the combination of the operational tasks ((J T,δx T ), concatenation of the tasks) and the constraints ((J C, δx C ), concatenation of the constraints). In the particular cases of joints related constraints (joint position and velocity limits), the constraint jacobian matrix is [0,...,0,±1,0,...,0], the ±1 rank being at the joint number in the manipulator chain, the sign depending on the limit type (maximum or minimum). These motions can be strictly prioritized in a multiobjective control law (see [4]) δq=j # 1δx 1 +(J 2 P J1 ) # (δx 2 J 2 J # 1δx 1 ) (2) where indexes 1 and 2 can be replaced by C and T and conversely. The # is a pseudoinversion operator (see [3]) and P J1 is a projector on the kernel of J 1 (details about inversions and projectors are exposed in section 3.1). Maciejewski [4] and Chaumette [5] proposed to put the constraints avoidance at the bottom of the task hierarchy (1 T, 2 C; referenced as control law A). It enables to striclty fulfill the tasks, but in case of conflict between the tasks and the constraints, the manipulator may violate the constraints. To avoid this, Sentis [6] puts the constraints at the top of the hierarchy (1 C, 2 T ; referenced as control law B). However, this choice has a bad impact on the reachability of the manipulator as the avoidance motions need activation thresholds, which results in oscillations on the functional parts of the manipulator. Moreover, as the constraints are not homogeneous (obstacle avoidance involves body lengths that depends on the obstacle position w.r.t. the robot, while joint limits do not), it is not possible to use a bounded potential. It implies a consequent size of the threshold, as the potential
4 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 3 should grow from zero to infinity along it, and also the possible presence of infinite terms in the control law. In order to avoid oscillations and infinite terms, Baerlocher uses in [7] an iterative approach based on an activation matrix that pre-multiplies the jacobian of the tasks. The algorithm deactivates the joints which violate their boundaries, so they are not included in the model inversion. However, this approach does not include other types of constraints and it often resorts to iterations in cases for which usual approaches find directly an admissible (i.e. constraints compliant) solution. This paper presents a framework that extends the approach of Baerlocher to the collisions avoidance and satisfies the joint velocity limits; in particular, when the environment is not overconstrained (number of DOF sufficient to track the tasks while complying to the constraints), the control law is equivalent to the classical control law A. A particular attention has been paid to keep the computation times in the range of the one obtained with control law A and B. In section 2, the Constraint Compliant Control (CCC), relying on the principle of passive avoidance, is introduced. Then, section 3 presents the simulations of two missions and the comparative results of the control laws presented previously (A, B and CCC). Finally, section 4 gathers the conclusions and the work perspectives. 2 Constraint Compliant Control This section exposes our contribution. First, the passive avoidance principle is developped, according to which the robot should not move to avoid static constraints. Then, the control law expression is exposed; finally, the whole algorithm is presented. 2.1 Passive Avoidance The approach of Baerlocher in [7] is equivalent to the insertion of a superior hierarchical level in which operational displacement would be null (δx C = 0). It has the advantage to satisfy the joint boundaries in all cases. The extension to every static constraints (static obstacles, joint position and velocity limits) is done using the following control law δq=j # C0+(J T P JC ) # (δx T J T J # C0)=(J T P JC ) # δx T (3) which ensures a strict compliance with any constraints in J C. This avoidance method is passive as no motion is generated by the proximity to a constraint. As what is described by the constraints expression is actually static in the physical world, no arbitrary motion is needed to satisfy them. Anyway, it is not often mandatory to forbid motions in all the constraints directions; it is not even desired, as it prevents
5 4 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia from getting closer to the constraints, but also from moving away from them. So, it is relevant to iterate on the constraints combinations to find the set of constraints that must be passively avoided to obtain an appropriate solution δ q, i.e. that minimizes the operational error while being admissible. Let J CC be a matrix containing a combination of lines of J C. The control law then becomes δq=(j T P JCC ) # δx T (4) Iterations are carried out to find the lines combination J CC which yields an appropriate δq. In particular, the admissibility test is performed using Eq. (7). 2.2 Active avoidance in additional objective The solutions admissibility can be increased by adding an extra term of active avoidance on the constraints that are not avoided passively: δq=(j T P JCC ) # δx T +(J }{{} CC P [ J ] CC ) # (δx CC J CC (J T P JC C) # δx T ) J Passive avoidance }{{} Active avoidance (5) where J CC is the complement of the lines of J CC in J C, δx CC is the desired operational avoidance displacement associated to J 1 CC and P [ J ] CC is the projector on the J kernel of the concatenation of J CC and J. The extra term tends to move the manipulator away from the constraints as long as the tasks are not impacted. In particular, when J c is empty, the control law behaves like control law A and a single iteration is needed when the situation is not overconstrained. The avoidance coefficients norm δx CC,i can be limited to avoid values tending to infinity. Finally, there are no oscillations on the functionnal part as the active avoidance term is under the task related term in the hierarchy. 2.3 Particular case of the joint velocity limit - Scaling The joint velocity limits should not be addressed with passive avoidance, as it would stop a joint to prevent it from going too fast. If a joint displacement is too high, the solution is scaled to reach the maximal admissible displacement. To keep the motion coherency, the scaling is done in a way that preserves the operational direction δq i,max δq δq min 0 i n δq i (6) 1 In a practical aspect, J CC (resp. δx CC ) can be replaced by J C (resp. δx C, desired operational avoidance displacement associated to J C ) in Eq. (5) without any consequence on the result.
6 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 5 where δq i,max is the maximum displacement of joint i on one iteration. This step is carried out only if a joint displacement δq i is higher than δq i,max. The test of admissibility with respect to the constraints is performed through J C δq l (7) where l is the concatenation of the maximum instantaneous displacements. In order to increase the validity of the solutions, the scaling is extended to all the solutions δq δq ( ) li min 0 i m (J C δq) i (8) (J C δq) i >0 The scaling is done only if Eq. (7) is not verified. This step enables to obtain an admissible solution for each constraints combination in J c. Actually, as all the constraints are in the form of Eq. (7), the solutions space is convex and contains the null solution (no motion). So, in every direction of the joint displacement space, there exists an admissible solution, which norm is null in the worst case. This method enables to get as close as possible to the constraints if there is a persistent demand in that way. The general algorithm of a control iteration is given by Algorithm 1. Algorithm 1 : CCC J C constraints under the active avoidance threshold δq comb 0 rad; δq 0 rad Err comb 0 m; Err 1 m; ε 10 2 m; for all Lines Combinations J CC in J C do δq comb Computation - Eq. (5) Admissibility Test - Eq. (7) Scaling - Eq. (8) Err comb Jδq δx T if Err comb Err then Err Err comb ; δq δq comb if Err ε then break end if end if end for send δq 3 Implementation and Comparative results This section presents the results of control laws A, B and CCC on two missions in the same environment. The proposed environment is composed of a column and a wall; the manipulator has 7 DOFs, all the links being 1 DOF rotational joints. The
7 6 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia environment and the manipulator are represented on Figure 2. The presented experi- Fig. 2 Views of the environment and the two trajectories to track; manipulator schemes. ments simulate two inspection missions involving trajectories close to the obstacles. For each mission, the manipulator must track a 3 coordinates trajectory: it is assumed that the effector (camera) has the orientation DOFs needed to observe the points to be inspected. For the sake of simplicity, the results presented here do not integrate joint boundaries avoidance even though the proposed framework can deal with this type of constraint without any specific difficulty. Mission 1: Go around the wall by the left side. The environment is barely constrained in that area, the manipulator tracks a trajectory (traj 1, in Figure 2) of 330 points on a single way of 3.50 m, so a displacement of 1.1 cm is expected for each iteration. The mission is feasible, i.e. the number of DOFs of the manipulator enables to fulfill the mission while avoiding the constraints. Mission 2: Reach a point behind the wall. The trajectory (traj 2, in Figure 2) has 560 points, for a go and come back trajectory (getting out of a very constrained configuration can be a problem). The total distance is 5.20 m long, so the expected displacement is 0.9 cm at each iteration. The mission is not feasible as the manipulator is not long enough to reach the furthest point. 3.1 Implementation The implementation is done in C++, and uses KDL (see [8]) and Boost::ublas 2 libraries. We detail the following implementation elements: Desired displacement δx T : difference between the current position and the current trajectory point /libs/numeric/ublas/doc/index.htm
8 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 7 Pseudoinversion: in the control law Eq. (5), in order to avoid inversion problems in the neighborhood of singularities, the pseudoinversions with exponent # are done using the Damped Least Square (DLS) method (see [9]), where the damping factor λ is chosen as A common way of computing P J is given by P J =(I J # J); in practice, the DLS method induces an error that distorts the projection, making the influence of lower priority objectives on upper priority objectives possible, which is not acceptable in our case. A safe way to compute P J can be obtained directly from the SVD of J which provides an access to the projector on the kernel of J without requiring its inversion (as mentionned in [10]). For the same reasons, a product (J a P Jb ) # is always pre-multiplicated by P Jb. Active avoidance : for control laws A and B, the active avoidance threshold is fixed to 15 cm, the gains are proportional (factor ) to the inverse of the distance to the constraint. For the CCC, the active avoidance is fixed to 4 cm, the gains are the same than for control laws A and B but the maximum value of the avoidance magnitude δx C is fixed to 0.25 (distance of 1 cm between the manipulator closest point and the obstacle). Distance computation : the distance computation is provided by the collision detection package SWIFT++ 3. The information given by SWIFT++ is, for each segment, the point of the segment that is the closest to the obstacle. The approach that consists in constraining only the closest point to the obstacle (based on [4] for the whole manipulator and on [11] for convex segments) is valid in continuous time. In discrete time, progressive displacements can violate constraints because of segment rotations. To our knowledge, no work has been carried out on that topic; a contribution of Kanehiro and al. in [12] deals with not strictly convex segments, in which the problems are similar to those encountered when getting from continuous to discrete time. To avoid the effects of this phenomenon, an envelope of 2 cm has been added around the environment. Joint instantaneous displacement limit : δq max has been fixed to 0.02 rad. 3.2 Results and Analysis Figures 3 and 4 present the results obtained on the 2 missions with control laws A, B and CCC. The computation times are given comparatively as they depend on the implementation and computing power. Mission 1: Go around the wall by the left side. Control law A. As the behavior is identical to the CCC on mission 1 (see 2.2), it is not represented on Figure 3. Control law B. The operational position mean error is 3.5 cm, the tracking is not optimal especially at the end where the effector gets close to the wall: oscillations are generated due to the thresholds (observable on both graphs) and the operational error grows up to 13.1 cm. 3
9 8 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia Fig. 3 Mission 1 results. Graphs of line 1 are obtained with control B, line 2 with control CCC Fig. 4 Mission 2 results. Graphs of line 1 are obtained with control A, line 2 with control B, line 3 with control CCC
10 Constraint Compliant Control for a Redundant Manipulator in a Cluttered Environment 9 Control law CCC. The behavior is identical to control law A: as there is no collisions when tracking the path with active avoidance at a lower level, the passive avoidance is not used and the manipulator has the same tracking error along the trajectory (operational position error inferior to 2.6 cm). Mission 2: Join a point behind the wall. Control law A. The operational position mean error is 3.8 cm and reaches 35 cm on peaks. When the situation gets overconstrained, collisions occur (the distances to the obstacle reach 0 for DOFS 4, 5 and 7) as it is not possible to satisfy tasks and constraints; the peaks on the operational positions comes from avoidance terms tending to infinity. Control law B. The oscillation phenomenon is higher than for mission 1 and the manipulator remains far from the path (operational position mean error 22.8 cm, max error 59.4 cm) Control law CCC. When the manipulator comes close to the environment (enveloppe distance: 2 cm), the passive avoidance clamps the directions to the obstacles (point A, B, C and D on the first column graph) and the concerned segments moves along the orthogonal directions. When the manipulator seems completely stuck (point E on the second column graph), the scaling step enables little displacements to track as much as possible the desired displacements. Finally, when the direction is inversed (point F on the 3rd column graph), the manipulator is able to get away from the constraints directly. The computation time grows up 6.7 times w.r.t. the ones obtained with control law A on mission 1. 4 Conclusion and Perspectives The CCC is an iterative control method that solves the hierarchical multi-objective control problem while satisfying any number of fixed constraints: obstacles, joint boundaries, joints velocity limits. The passive avoidance principle and the solutions scaling enables to overcome the drawbacks of active avoidance at the top (optimality loss, oscillations) or at the bottom (constraints violation, infinite terms) of the hierarchy, while ensuring a computation time low enough to consider its use in real time on classical manipulators. The CCC performances can be compared to the one obtained with convex optimization algorithms (even if the latter cannot ensure strict priorities between the hierarchy levels). As an example, the algorithm QuadProg++ 4 satisfies the constraints with a maximum computation time of 3 times the one of control law A. Nevertheless, the insufficiency of the avoidance method (see section 3.1) added to the algorithm trend to run along the constraints make the manipulator not able to get away of the most constrained configuration: it does not track the second part of the trajectory. 4
11 10 S. Rubrecht, V. Padois, P. Bidaud and M. de Broissia The work perspective includes: The continuity can be handled by including the limits of joint acceleration constraints but they introduce incompatibilities with obstacles and joint position limits; the use of virtual constraints (dampers) is under evaluation. Locally, the constraints combination choice can be guided by the constraints criticity or by favouring combinations retained for previous iterations, etc. In a more global scope, this choice can be adapted to the missions and it can depend on the parts of the robot: active avoidance for better motion capabilities, passive avoidance to work close to the constraints. Acknowledgements This work is a part of the TELEMACH project. It is supported by the French National Research Agency (ANR), Interactive Systems and Robotics Program 2007 (PSIROB07). References 1. Rubrecht, S. and Padois, V. and Bidaud, P.: Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment. In IEEE/RSJ International Conference on Intelligent Robots and Systems, Workshop on Exploring new horizons in Evolutionary Design of Robots. pp (2009) 2. Khatib, O.: Real-Time Obstacle Avoidance for Manipulators and Mobile Robots. The International Journal of Robotics Research. 5(1), pp (1986) 3. Ben Israel, A. and Greville, T.N.E.: Generalized Inverses: Theory and Applications. Springer (2nd edition) (2003) 4. Maciejewski, A. and Klein, C.: Obstacle avoidance for kinematically redundant manipulators in dynamically varying environments. The International Journal of Robotics Research. 4(3), pp (1985) 5. Chaumette, F. and Marchand, E.: A New Redundancy-based Iterative Scheme for Avoiding Joint Limits Application to visual servoing. In: IEEE International Conference on Robotics and Automation, 2, pp (2000) 6. Sentis, L. and Khatib, O.: Synthesis of whole-body behaviors through hierarchical control of behavioral primitives. The International Journal of Humanoid Robotics. 2(4), pp (2005) 7. Baerlocher, P. and Boulic, R.: An Inverse Kinematic Architecture Enforcing an Arbitrary Number of Strict Priority Levels. The Visual Computer: International Journal of Computer Graphics. 20(6), pp (2004) 8. Bruyninckx, H.: Open Robot Control Software: the OROCOS project. In: IEEE International Conference on Robotics and Automation, 3, pp (2001) 9. Nakamura, Y. and Hanafusa, H.: Inverse kinematics solutions with singularity robustness for robot manipulator control. Journal of Dynamic Systems, Measurement and Control. 108, pp (1986) 10. Salaun, C. and Padois, V. and Sigaud, O.: Control of Redundant Robots Using Learned Models: An Operational Space Control Approach. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp (2009) 11. Faverjon, B. and Tournassoud, P.: A Local Based Approach for Path Planning of Manipulators With a High Number of Degrees of Freedom. In: IEEE International Conference on Robotics and Automation. 4, pp (1987) 12. Kanehiro, F. and Lamiraux, F. and Kanoun, O. and Yoshida, E. and Laumond, J-P.: A Local Collision Avoidance Method for Non-strictly Convex Polyhedra. In: Proceedings of Robotics: Science and Systems IV (2008).
Moveability and Collision Analysis for Fully-Parallel Manipulators
Moveability and Collision Analysis for Fully-Parallel Manipulators Damien Chablat, Philippe Wenger To cite this version: Damien Chablat, Philippe Wenger. Moveability and Collision Analysis for Fully-Parallel
More informationReal-time FEM based control of soft surgical robots
Real-time FEM based control of soft surgical robots Frederick Largilliere, Eulalie Coevoet, Laurent Grisoni, Christian Duriez To cite this version: Frederick Largilliere, Eulalie Coevoet, Laurent Grisoni,
More informationWorkspace and joint space analysis of the 3-RPS parallel robot
Workspace and joint space analysis of the 3-RPS parallel robot Damien Chablat, Ranjan Jha, Fabrice Rouillier, Guillaume Moroz To cite this version: Damien Chablat, Ranjan Jha, Fabrice Rouillier, Guillaume
More informationHow to simulate a volume-controlled flooding with mathematical morphology operators?
How to simulate a volume-controlled flooding with mathematical morphology operators? Serge Beucher To cite this version: Serge Beucher. How to simulate a volume-controlled flooding with mathematical morphology
More informationJane Li. Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute
Jane Li Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute (3 pts) Compare the testing methods for testing path segment and finding first
More informationEvolutionary Design of a Robotic Manipulator for a Highly Constrained Environment
Evolutionary Design of a Robotic Manipulator for a Highly Constrained Environment Sébastien Rubrecht, Ekta Singla, Vincent Padois, Philippe Bidaud, Michel De Broissia To cite this version: Sébastien Rubrecht,
More informationGeometric and numerical aspects of redundancy
Geometric and numerical aspects of redundancy Pierre-Brice Wieber, Adrien Escande, Dimitar Dimitrov, Alexander Sherikov To cite this version: Pierre-Brice Wieber, Adrien Escande, Dimitar Dimitrov, Alexander
More informationHySCaS: Hybrid Stereoscopic Calibration Software
HySCaS: Hybrid Stereoscopic Calibration Software Guillaume Caron, Damien Eynard To cite this version: Guillaume Caron, Damien Eynard. HySCaS: Hybrid Stereoscopic Calibration Software. SPIE newsroom in
More informationMokka, main guidelines and future
Mokka, main guidelines and future P. Mora De Freitas To cite this version: P. Mora De Freitas. Mokka, main guidelines and future. H. Videau; J-C. Brient. International Conference on Linear Collider, Apr
More informationReal-Time Collision Detection for Dynamic Virtual Environments
Real-Time Collision Detection for Dynamic Virtual Environments Gabriel Zachmann, Matthias Teschner, Stefan Kimmerle, Bruno Heidelberger, Laks Raghupathi, Arnulph Fuhrmann To cite this version: Gabriel
More informationASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler
ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler François Gonard, Marc Schoenauer, Michele Sebag To cite this version: François Gonard, Marc Schoenauer, Michele Sebag.
More informationComparator: A Tool for Quantifying Behavioural Compatibility
Comparator: A Tool for Quantifying Behavioural Compatibility Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel To cite this version: Meriem Ouederni, Gwen Salaün, Javier Cámara, Ernesto Pimentel.
More informationA N-dimensional Stochastic Control Algorithm for Electricity Asset Management on PC cluster and Blue Gene Supercomputer
A N-dimensional Stochastic Control Algorithm for Electricity Asset Management on PC cluster and Blue Gene Supercomputer Stéphane Vialle, Xavier Warin, Patrick Mercier To cite this version: Stéphane Vialle,
More informationIntermediate Desired Value Approach for Continuous Transition among Multiple Tasks of Robots
2 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-3, 2, Shanghai, China Intermediate Desired Value Approach for Continuous Transition among Multiple
More informationLossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique
Lossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique Marie Babel, Olivier Déforges To cite this version: Marie Babel, Olivier Déforges. Lossless and Lossy
More informationRobust IP and UDP-lite header recovery for packetized multimedia transmission
Robust IP and UDP-lite header recovery for packetized multimedia transmission Michel Kieffer, François Mériaux To cite this version: Michel Kieffer, François Mériaux. Robust IP and UDP-lite header recovery
More informationBoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm
BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard To cite this version: Zeina Azmeh, Fady Hamoui, Marianne Huchard. BoxPlot++. RR-11001, 2011. HAL Id: lirmm-00557222 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00557222
More informationService Reconfiguration in the DANAH Assistive System
Service Reconfiguration in the DANAH Assistive System Said Lankri, Pascal Berruet, Jean-Luc Philippe To cite this version: Said Lankri, Pascal Berruet, Jean-Luc Philippe. Service Reconfiguration in the
More informationSDLS: a Matlab package for solving conic least-squares problems
SDLS: a Matlab package for solving conic least-squares problems Didier Henrion, Jérôme Malick To cite this version: Didier Henrion, Jérôme Malick. SDLS: a Matlab package for solving conic least-squares
More informationlambda-min Decoding Algorithm of Regular and Irregular LDPC Codes
lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger To cite this version: Emmanuel Boutillon, Frédéric Guillou, Jean-Luc Danger lambda-min
More informationEfficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function
Efficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function F Arlery, R assab, U Tan, F Lehmann To cite this version: F Arlery, R assab, U Tan, F Lehmann. Efficient Gradient
More informationComparison of radiosity and ray-tracing methods for coupled rooms
Comparison of radiosity and ray-tracing methods for coupled rooms Jimmy Dondaine, Alain Le Bot, Joel Rech, Sébastien Mussa Peretto To cite this version: Jimmy Dondaine, Alain Le Bot, Joel Rech, Sébastien
More informationSetup of epiphytic assistance systems with SEPIA
Setup of epiphytic assistance systems with SEPIA Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine Champin, Marie Lefevre To cite this version: Blandine Ginon, Stéphanie Jean-Daubias, Pierre-Antoine
More informationSimulations of VANET Scenarios with OPNET and SUMO
Simulations of VANET Scenarios with OPNET and SUMO Florent Kaisser, Christophe Gransart, Marion Berbineau To cite this version: Florent Kaisser, Christophe Gransart, Marion Berbineau. Simulations of VANET
More informationQuickRanking: Fast Algorithm For Sorting And Ranking Data
QuickRanking: Fast Algorithm For Sorting And Ranking Data Laurent Ott To cite this version: Laurent Ott. QuickRanking: Fast Algorithm For Sorting And Ranking Data. Fichiers produits par l auteur. 2015.
More informationTHE KINEMATIC AND INERTIAL SOIL-PILE INTERACTIONS: CENTRIFUGE MODELLING
THE KINEMATIC AND INERTIAL SOIL-PILE INTERACTIONS: CENTRIFUGE MODELLING Nawel Chenaf, Jean-Louis Chazelas To cite this version: Nawel Chenaf, Jean-Louis Chazelas. THE KINEMATIC AND INERTIAL SOIL-PILE INTER-
More informationPrioritizing linear equality and inequality systems: application to local motion planning for redundant. robots
Prioritizing linear equality and inequality systems: application to local motion planning for redundant robots Oussama Kanoun, Florent Lamiraux, Pierre-Brice Wieber, Fumio Kanehiro, Eiichi Yoshida, Jean-Paul
More informationA local planner for closed-loop robot
A local planner for closed-loop robot Jean-Pierre Merlet To cite this version: Jean-Pierre Merlet. A local planner for closed-loop robot. IEEE ICRA, Apr 007, Rome, 007. HAL Id: inria-0009336
More informationModularity for Java and How OSGi Can Help
Modularity for Java and How OSGi Can Help Richard Hall To cite this version: Richard Hall. Modularity for Java and How OSGi Can Help. présentation invitée à DECOR04. 2004. HAL Id: hal-00003299
More informationKinematic analysis of planar tensegrity 2-X manipulators
Kinematic analysis of planar tensegrity -X manipulators Matthieu Furet, Max Lettl, Philippe Wenger To cite this version: Matthieu Furet, Max Lettl, Philippe Wenger. Kinematic analysis of planar tensegrity
More informationLinked data from your pocket: The Android RDFContentProvider
Linked data from your pocket: The Android RDFContentProvider Jérôme David, Jérôme Euzenat To cite this version: Jérôme David, Jérôme Euzenat. Linked data from your pocket: The Android RDFContentProvider.
More informationAssisted Policy Management for SPARQL Endpoints Access Control
Assisted Policy Management for SPARQL Endpoints Access Control Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien Gandon To cite this version: Luca Costabello, Serena Villata, Iacopo Vagliano, Fabien
More informationComputing and maximizing the exact reliability of wireless backhaul networks
Computing and maximizing the exact reliability of wireless backhaul networks David Coudert, James Luedtke, Eduardo Moreno, Konstantinos Priftis To cite this version: David Coudert, James Luedtke, Eduardo
More informationTacked Link List - An Improved Linked List for Advance Resource Reservation
Tacked Link List - An Improved Linked List for Advance Resource Reservation Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu To cite this version: Li-Bing Wu, Jing Fan, Lei Nie, Bing-Yi Liu. Tacked Link List
More informationAn Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions
An Efficient Numerical Inverse Scattering Algorithm for Generalized Zakharov-Shabat Equations with Two Potential Functions Huaibin Tang, Qinghua Zhang To cite this version: Huaibin Tang, Qinghua Zhang.
More informationTHE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS
THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS Antoine Mhanna To cite this version: Antoine Mhanna. THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS. 016. HAL Id: hal-0158188
More informationRepresentation of Finite Games as Network Congestion Games
Representation of Finite Games as Network Congestion Games Igal Milchtaich To cite this version: Igal Milchtaich. Representation of Finite Games as Network Congestion Games. Roberto Cominetti and Sylvain
More informationRegularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material
Regularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material Yingying Song, David Brie, El-Hadi Djermoune, Simon Henrot To cite this version: Yingying Song,
More informationNP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal
NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489
More informationBlind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better
Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better Waseem Safi Fabrice Maurel Jean-Marc Routoure Pierre Beust Gaël Dias To cite this version: Waseem Safi Fabrice Maurel Jean-Marc
More information1498. End-effector vibrations reduction in trajectory tracking for mobile manipulator
1498. End-effector vibrations reduction in trajectory tracking for mobile manipulator G. Pajak University of Zielona Gora, Faculty of Mechanical Engineering, Zielona Góra, Poland E-mail: g.pajak@iizp.uz.zgora.pl
More informationEfficient implementation of interval matrix multiplication
Efficient implementation of interval matrix multiplication Hong Diep Nguyen To cite this version: Hong Diep Nguyen. Efficient implementation of interval matrix multiplication. Para 2010: State of the Art
More informationContinuous Control of Lagrangian Data
Continuous Control of Lagrangian Data Pierre Allain, Nicolas Courty, Thomas Corpetti To cite this version: Pierre Allain, Nicolas Courty, Thomas Corpetti. Continuous Control of Lagrangian Data. 3rd International
More information1724. Mobile manipulators collision-free trajectory planning with regard to end-effector vibrations elimination
1724. Mobile manipulators collision-free trajectory planning with regard to end-effector vibrations elimination Iwona Pajak 1, Grzegorz Pajak 2 University of Zielona Gora, Faculty of Mechanical Engineering,
More informationKeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard
KeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard Mathieu Raynal, Nadine Vigouroux To cite this version: Mathieu Raynal, Nadine Vigouroux. KeyGlasses : Semi-transparent keys
More informationKinematics Analysis of Free-Floating Redundant Space Manipulator based on Momentum Conservation. Germany, ,
Kinematics Analysis of Free-Floating Redundant Space Manipulator based on Momentum Conservation Mingming Wang (1) (1) Institute of Astronautics, TU Muenchen, Boltzmannstr. 15, D-85748, Garching, Germany,
More informationThe Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks
The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks Florian Huc, Claudia Linhares Sales, Hervé Rivano To cite this version: Florian Huc, Claudia Linhares Sales, Hervé Rivano.
More informationReverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces
Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces Romain Delamare, Benoit Baudry, Yves Le Traon To cite this version: Romain Delamare, Benoit Baudry, Yves Le Traon. Reverse-engineering
More informationChange Detection System for the Maintenance of Automated Testing
Change Detection System for the Maintenance of Automated Testing Miroslav Bures To cite this version: Miroslav Bures. Change Detection System for the Maintenance of Automated Testing. Mercedes G. Merayo;
More informationFault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid
Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid Minhwan Ok To cite this version: Minhwan Ok. Fault-Tolerant s for the Databases of Redundant Web Servers in a Computing Grid.
More informationDANCer: Dynamic Attributed Network with Community Structure Generator
DANCer: Dynamic Attributed Network with Community Structure Generator Oualid Benyahia, Christine Largeron, Baptiste Jeudy, Osmar Zaïane To cite this version: Oualid Benyahia, Christine Largeron, Baptiste
More informationA Methodology for Improving Software Design Lifecycle in Embedded Control Systems
A Methodology for Improving Software Design Lifecycle in Embedded Control Systems Mohamed El Mongi Ben Gaïd, Rémy Kocik, Yves Sorel, Rédha Hamouche To cite this version: Mohamed El Mongi Ben Gaïd, Rémy
More informationOpen Digital Forms. Hiep Le, Thomas Rebele, Fabian Suchanek. HAL Id: hal
Open Digital Forms Hiep Le, Thomas Rebele, Fabian Suchanek To cite this version: Hiep Le, Thomas Rebele, Fabian Suchanek. Open Digital Forms. Research and Advanced Technology for Digital Libraries - 20th
More informationThe optimal routing of augmented cubes.
The optimal routing of augmented cubes. Meirun Chen, Reza Naserasr To cite this version: Meirun Chen, Reza Naserasr. The optimal routing of augmented cubes.. Information Processing Letters, Elsevier, 28.
More informationTaking Benefit from the User Density in Large Cities for Delivering SMS
Taking Benefit from the User Density in Large Cities for Delivering SMS Yannick Léo, Anthony Busson, Carlos Sarraute, Eric Fleury To cite this version: Yannick Léo, Anthony Busson, Carlos Sarraute, Eric
More informationComparison of spatial indexes
Comparison of spatial indexes Nathalie Andrea Barbosa Roa To cite this version: Nathalie Andrea Barbosa Roa. Comparison of spatial indexes. [Research Report] Rapport LAAS n 16631,., 13p. HAL
More informationAn Experimental Assessment of the 2D Visibility Complex
An Experimental Assessment of the D Visibility Complex Hazel Everett, Sylvain Lazard, Sylvain Petitjean, Linqiao Zhang To cite this version: Hazel Everett, Sylvain Lazard, Sylvain Petitjean, Linqiao Zhang.
More informationVery Tight Coupling between LTE and WiFi: a Practical Analysis
Very Tight Coupling between LTE and WiFi: a Practical Analysis Younes Khadraoui, Xavier Lagrange, Annie Gravey To cite this version: Younes Khadraoui, Xavier Lagrange, Annie Gravey. Very Tight Coupling
More informationKinematic Control Algorithms for On-Line Obstacle Avoidance for Redundant Manipulators
Kinematic Control Algorithms for On-Line Obstacle Avoidance for Redundant Manipulators Leon Žlajpah and Bojan Nemec Institute Jožef Stefan, Ljubljana, Slovenia, leon.zlajpah@ijs.si Abstract The paper deals
More informationThe Connectivity Order of Links
The Connectivity Order of Links Stéphane Dugowson To cite this version: Stéphane Dugowson. The Connectivity Order of Links. 4 pages, 2 figures. 2008. HAL Id: hal-00275717 https://hal.archives-ouvertes.fr/hal-00275717
More informationROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES
ROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES Olivier Brouard, Fabrice Delannay, Vincent Ricordel, Dominique
More informationBranch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows
Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows Estèle Glize, Nicolas Jozefowiez, Sandra Ulrich Ngueveu To cite this version: Estèle Glize, Nicolas Jozefowiez,
More informationLearning a Representation of a Believable Virtual Character s Environment with an Imitation Algorithm
Learning a Representation of a Believable Virtual Character s Environment with an Imitation Algorithm Fabien Tencé, Cédric Buche, Pierre De Loor, Olivier Marc To cite this version: Fabien Tencé, Cédric
More informationCompromise Based Evolutionary Multiobjective Optimization Algorithm for Multidisciplinary Optimization
Compromise Based Evolutionary Multiobjective Optimization Algorithm for Multidisciplinary Optimization Benoît Guédas, Xavier Gandibleux, Philippe Dépincé To cite this version: Benoît Guédas, Xavier Gandibleux,
More informationRelabeling nodes according to the structure of the graph
Relabeling nodes according to the structure of the graph Ronan Hamon, Céline Robardet, Pierre Borgnat, Patrick Flandrin To cite this version: Ronan Hamon, Céline Robardet, Pierre Borgnat, Patrick Flandrin.
More informationMultimedia CTI Services for Telecommunication Systems
Multimedia CTI Services for Telecommunication Systems Xavier Scharff, Pascal Lorenz, Zoubir Mammeri To cite this version: Xavier Scharff, Pascal Lorenz, Zoubir Mammeri. Multimedia CTI Services for Telecommunication
More informationMalware models for network and service management
Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.
More informationNatural Language Based User Interface for On-Demand Service Composition
Natural Language Based User Interface for On-Demand Service Composition Marcel Cremene, Florin-Claudiu Pop, Stéphane Lavirotte, Jean-Yves Tigli To cite this version: Marcel Cremene, Florin-Claudiu Pop,
More informationFormal modelling of ontologies within Event-B
Formal modelling of ontologies within Event-B Yamine Ait Ameur, Idir Ait-Sadoune, Kahina Hacid, Linda Mohand Oussaid To cite this version: Yamine Ait Ameur, Idir Ait-Sadoune, Kahina Hacid, Linda Mohand
More informationScalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints
Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints Joris Guyonvarc H, Sébastien Ferré To cite this version: Joris Guyonvarc H, Sébastien Ferré. Scalewelis: a Scalable Query-based
More informationSynthesis of fixed-point programs: the case of matrix multiplication
Synthesis of fixed-point programs: the case of matrix multiplication Mohamed Amine Najahi To cite this version: Mohamed Amine Najahi. Synthesis of fixed-point programs: the case of matrix multiplication.
More informationResearch Subject. Dynamics Computation and Behavior Capture of Human Figures (Nakamura Group)
Research Subject Dynamics Computation and Behavior Capture of Human Figures (Nakamura Group) (1) Goal and summary Introduction Humanoid has less actuators than its movable degrees of freedom (DOF) which
More informationPrimitive roots of bi-periodic infinite pictures
Primitive roots of bi-periodic infinite pictures Nicolas Bacquey To cite this version: Nicolas Bacquey. Primitive roots of bi-periodic infinite pictures. Words 5, Sep 5, Kiel, Germany. Words 5, Local Proceedings.
More informationChanging Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-RPR Planar Parallel Robots
Changing Assembly Modes without Passing Parallel Singularities in Non-Cuspidal 3-RPR Planar Parallel Robots Ilian Bonev, Sébastien Briot, Philippe Wenger, Damien Chablat To cite this version: Ilian Bonev,
More informationUsing a Medical Thesaurus to Predict Query Difficulty
Using a Medical Thesaurus to Predict Query Difficulty Florian Boudin, Jian-Yun Nie, Martin Dawes To cite this version: Florian Boudin, Jian-Yun Nie, Martin Dawes. Using a Medical Thesaurus to Predict Query
More informationFast and precise kinematic skeleton extraction of 3D dynamic meshes
Fast and precise kinematic skeleton extraction of 3D dynamic meshes Julien Tierny, Jean-Philippe Vandeborre, Mohamed Daoudi To cite this version: Julien Tierny, Jean-Philippe Vandeborre, Mohamed Daoudi.
More informationCaptured Motion Data Processing for Real Time Synthesis of Sign Language
Captured Motion Data Processing for Real Time Synthesis of Sign Language Alexis Héloir, Sylvie Gibet, Franck Multon, Nicolas Courty To cite this version: Alexis Héloir, Sylvie Gibet, Franck Multon, Nicolas
More informationSpectral Active Clustering of Remote Sensing Images
Spectral Active Clustering of Remote Sensing Images Zifeng Wang, Gui-Song Xia, Caiming Xiong, Liangpei Zhang To cite this version: Zifeng Wang, Gui-Song Xia, Caiming Xiong, Liangpei Zhang. Spectral Active
More informationFuzzy sensor for the perception of colour
Fuzzy sensor for the perception of colour Eric Benoit, Laurent Foulloy, Sylvie Galichet, Gilles Mauris To cite this version: Eric Benoit, Laurent Foulloy, Sylvie Galichet, Gilles Mauris. Fuzzy sensor for
More informationQuasi-tilings. Dominique Rossin, Daniel Krob, Sebastien Desreux
Quasi-tilings Dominique Rossin, Daniel Krob, Sebastien Desreux To cite this version: Dominique Rossin, Daniel Krob, Sebastien Desreux. Quasi-tilings. FPSAC/SFCA 03, 2003, Linkoping, Sweden. 2003.
More informationStudy on Feebly Open Set with Respect to an Ideal Topological Spaces
Study on Feebly Open Set with Respect to an Ideal Topological Spaces Yiezi K. Al Talkany, Suadud H. Al Ismael To cite this version: Yiezi K. Al Talkany, Suadud H. Al Ismael. Study on Feebly Open Set with
More informationAn FCA Framework for Knowledge Discovery in SPARQL Query Answers
An FCA Framework for Knowledge Discovery in SPARQL Query Answers Melisachew Wudage Chekol, Amedeo Napoli To cite this version: Melisachew Wudage Chekol, Amedeo Napoli. An FCA Framework for Knowledge Discovery
More informationA Practical Approach for 3D Model Indexing by combining Local and Global Invariants
A Practical Approach for 3D Model Indexing by combining Local and Global Invariants Jean-Philippe Vandeborre, Vincent Couillet, Mohamed Daoudi To cite this version: Jean-Philippe Vandeborre, Vincent Couillet,
More informationAcyclic Coloring of Graphs of Maximum Degree
Acyclic Coloring of Graphs of Maximum Degree Guillaume Fertin, André Raspaud To cite this version: Guillaume Fertin, André Raspaud. Acyclic Coloring of Graphs of Maximum Degree. Stefan Felsner. 005 European
More informationDSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI
DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI Cyrielle Guérin, Renaud Binet, Marc Pierrot-Deseilligny To cite this version: Cyrielle Guérin, Renaud Binet,
More informationTeaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs
Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs Gilles Ardourel, Marianne Huchard To cite this version: Gilles Ardourel, Marianne Huchard. Teaching Encapsulation and
More informationMUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor
MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor Matthieu Nicolas, Victorien Elvinger, Gérald Oster, Claudia-Lavinia Ignat, François Charoy To cite this version: Matthieu Nicolas, Victorien
More informationSIM-Mee - Mobilizing your social network
SIM-Mee - Mobilizing your social network Jérémie Albert, Serge Chaumette, Damien Dubernet, Jonathan Ouoba To cite this version: Jérémie Albert, Serge Chaumette, Damien Dubernet, Jonathan Ouoba. SIM-Mee
More informationLecture «Robot Dynamics»: Kinematic Control
Lecture «Robot Dynamics»: Kinematic Control 151-0851-00 V lecture: CAB G11 Tuesday 10:15 12:00, every week exercise: HG E1.2 Wednesday 8:15 10:00, according to schedule (about every 2nd week) Marco Hutter,
More informationScale Invariant Detection and Tracking of Elongated Structures
Scale Invariant Detection and Tracking of Elongated Structures Amaury Nègre, James L. Crowley, Christian Laugier To cite this version: Amaury Nègre, James L. Crowley, Christian Laugier. Scale Invariant
More informationImplementing an Automatic Functional Test Pattern Generation for Mixed-Signal Boards in a Maintenance Context
Implementing an Automatic Functional Test Pattern Generation for Mixed-Signal Boards in a Maintenance Context Bertrand Gilles, Laurent Tchamnda Nana, Valérie-Anne Nicolas To cite this version: Bertrand
More informationMulti-atlas labeling with population-specific template and non-local patch-based label fusion
Multi-atlas labeling with population-specific template and non-local patch-based label fusion Vladimir Fonov, Pierrick Coupé, Simon Eskildsen, Jose Manjon, Louis Collins To cite this version: Vladimir
More informationLinux: Understanding Process-Level Power Consumption
Linux: Understanding Process-Level Power Consumption Aurélien Bourdon, Adel Noureddine, Romain Rouvoy, Lionel Seinturier To cite this version: Aurélien Bourdon, Adel Noureddine, Romain Rouvoy, Lionel Seinturier.
More informationOA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles
OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles Ines Khoufi, Pascale Minet, Anis Laouiti To cite this version: Ines Khoufi, Pascale Minet, Anis Laouiti.
More informationPreliminary analysis of the drive system of the CTA LST Telescope and its integration in the whole PLC architecture
drive system of the CTA LST the whole PLC architecture I. Monteiro, L. Brunetti, T. Le Flour, G. Lamanna, B. Lieunard To cite this version: I. Monteiro, L. Brunetti, T. Le Flour, G. Lamanna, B. Lieunard..
More informationAccurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic Coordinates
Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic Coordinates Karl Osen To cite this version: Karl Osen. Accurate Conversion of Earth-Fixed Earth-Centered Coordinates to Geodetic
More informationSmooth Transition Between Tasks on a Kinematic Control Level: Application to Self Collision Avoidance for Two Kuka LWR Robots
Smooth Transition Between Tasks on a Kinematic Control Level: Application to Self Collision Avoidance for Two Kuka LWR Robots Tadej Petrič and Leon Žlajpah Abstract A common approach for kinematically
More informationPrototype Selection Methods for On-line HWR
Prototype Selection Methods for On-line HWR Jakob Sternby To cite this version: Jakob Sternby. Prototype Selection Methods for On-line HWR. Guy Lorette. Tenth International Workshop on Frontiers in Handwriting
More informationMotion-based obstacle detection and tracking for car driving assistance
Motion-based obstacle detection and tracking for car driving assistance G. Lefaix, E. Marchand, Patrick Bouthemy To cite this version: G. Lefaix, E. Marchand, Patrick Bouthemy. Motion-based obstacle detection
More informationInverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations
Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Peter Englert Machine Learning and Robotics Lab Universität Stuttgart Germany
More information